1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
14

Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto

link1. Computer 1 has zero processing delay. Assume each router has zero queuing and zero processing delay. Link 1 is a 25 Megabit/sec link (caution that was bits not bytes) and is 10,000 km long. Link 2 is 5Megabits/sec and is 10,000 km long. Link 3 is 15 Megabits/sec and is 10,000 km long. Propagation speed is 2 x 108 m/s. Assume a router has to receive all of a packet before it can start sending it out along the next link (assume store and forward). What is the total end to end delay for packet number one (time from first bit output on link 1 until last bit received at computer 2)
Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
5 0

Answer: umm sorry

Explanation:

You might be interested in
Brian is a computer engineer who writes security software for a banking system. The
pashok25 [27]

Answer:

Programming & Software Development

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model.

II. An incremental model.

III. A spiral model.

Also, programming refers to a software development process which typically involves writing the sets of instructions (codes) that are responsible for the proper functioning of a software.

In this scenario, Brian is a computer engineer who writes security software for a banking system.

Thus, the pathway in the Information Technology career cluster that Brian's job falls into is Programming & Software Development.

7 0
3 years ago
A _______ is a host that runs software to provide information, such as web content, to other hosts.
kolezko [41]

Answer:

The correct answer to the following question will be "Server".

Explanation:

  • Any device with a network connection is a host, but only hosts which accept other device connections (climates) are Servers.
  • All servers were hosts, but the servers aren't all hosts.
  • Each host network is a node, however not all network nodes are a host. Networking hardware such as modems, hubs, and network switches are not necessarily network addresses allocated (except for administrative purposes sometimes).
8 0
4 years ago
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy with
natulia [17]

Answer:

The given statement is "True".

Explanation:

  • Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.
  • Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.
4 0
3 years ago
Kelly is evaluating the following image. Which of the statements that she makes about the photograph is true?
Stells [14]

Photo not included

Plz add photo

7 0
3 years ago
1) How can you set data types such as Number, currency and date in Ms- Excel? 2) Explain how values, text, data and time can be
cestrela7 [59]

Today I am going to share with you my ideas about my favourite time of the day. All time is great. It is God's gift to us to make or mar ourselves. I respect time whether in the morning, afternoon, evening, or night; I just love time.

8 0
3 years ago
Other questions:
  • You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation
    12·1 answer
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
    11·1 answer
  • Write a program that reads in the following data, all entered on one line with at least one space separating them: a) an integer
    13·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • What will happen if you delete system32?
    7·1 answer
  • Java code?????
    12·1 answer
  • What is a central idea for 3 Despite this lack of precision, Galileo had constructed a wonderful invention. Yet, he considered i
    5·1 answer
  • Create a class called StockTester that has the following fucntionality. a. Create a main method with an ArrayList named dataStoc
    9·1 answer
  • 1 point
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!